Which of the following is needed for System Accountability?
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Give this one a try later!
A. audit mechanisms
Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what
purpose?
A. message non-repudiation.
B. message confidentiality.
C. message interleave checking.
D. message integrity.
,Give this one a try later!
D. message integrity
Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The
originator encrypts information using the intended recipient's "public" key in
order to get confidentiality of the data being sent. The recipients use their own
"private" key to decrypt the information. The "Infrastructure" of this methodology
ensures that:
A. The sender and recipient have reached a mutual agreement on the encryption key
exchange that they will use.
B. The channels through which the information flows are secure.
C. The recipient's identity can be positively verified by the sender.
D. The sender of the message is the only other person with access to the recipient's
private key.
Give this one a try later!
c
What is the name of a one way transformation of a string of characters into a usually
shorter fixed-length value or key that represents the original string? Such a
transformation cannot be reversed?
A. One-way hash
B. DES
C. Transposition
D. Substitution
Give this one a try later!
, A. one-way hash
Which authentication technique best protects against hijacking?
A. Static authentication
B. Continuous authentication
C. Robust authentication
D. Strong authentication
Give this one a try later!
B. Continuous authentication
Which of the following is NOT an advantage that TACACS+ has over TACACS?
A. Event logging
B. Use of two-factor password authentication
C. User has the ability to change his password
D. Ability for security tokens to be resynchronized
Give this one a try later!
A. Event logging
Which backup method is additive because the time and tape space required for each
night's backup grows during the week as it copies the day's changed files and
the previous days' changed files up to the last full backup?
A. differential backup method
B. full backup method
C. incremental backup method
D. tape backup method.
, Give this one a try later!
A. Differential backup
Which of the following would be the MOST serious risk where a systems development
life cycle methodology is inadequate?
A. The project will be completed late.
B. The project will exceed the cost estimates.
C. The project will be incompatible with existing systems.
D. The project will fail to meet business and user needs.
Give this one a try later!
D. The project will fail to meet business and user needs
What is called a system that is capable of detecting that a fault has occurred and has
the ability to correct the fault or operate around it?
A. A fail safe system
B. A fail soft system
C. A fault-tolerant system
D. A failover system
Give this one a try later!
C. a fault tolerant system
Which of the following floors would be most appropriate to locate information
processing facilities in a 6-stories building?
A. Basement
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Give this one a try later!
A. audit mechanisms
Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what
purpose?
A. message non-repudiation.
B. message confidentiality.
C. message interleave checking.
D. message integrity.
,Give this one a try later!
D. message integrity
Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The
originator encrypts information using the intended recipient's "public" key in
order to get confidentiality of the data being sent. The recipients use their own
"private" key to decrypt the information. The "Infrastructure" of this methodology
ensures that:
A. The sender and recipient have reached a mutual agreement on the encryption key
exchange that they will use.
B. The channels through which the information flows are secure.
C. The recipient's identity can be positively verified by the sender.
D. The sender of the message is the only other person with access to the recipient's
private key.
Give this one a try later!
c
What is the name of a one way transformation of a string of characters into a usually
shorter fixed-length value or key that represents the original string? Such a
transformation cannot be reversed?
A. One-way hash
B. DES
C. Transposition
D. Substitution
Give this one a try later!
, A. one-way hash
Which authentication technique best protects against hijacking?
A. Static authentication
B. Continuous authentication
C. Robust authentication
D. Strong authentication
Give this one a try later!
B. Continuous authentication
Which of the following is NOT an advantage that TACACS+ has over TACACS?
A. Event logging
B. Use of two-factor password authentication
C. User has the ability to change his password
D. Ability for security tokens to be resynchronized
Give this one a try later!
A. Event logging
Which backup method is additive because the time and tape space required for each
night's backup grows during the week as it copies the day's changed files and
the previous days' changed files up to the last full backup?
A. differential backup method
B. full backup method
C. incremental backup method
D. tape backup method.
, Give this one a try later!
A. Differential backup
Which of the following would be the MOST serious risk where a systems development
life cycle methodology is inadequate?
A. The project will be completed late.
B. The project will exceed the cost estimates.
C. The project will be incompatible with existing systems.
D. The project will fail to meet business and user needs.
Give this one a try later!
D. The project will fail to meet business and user needs
What is called a system that is capable of detecting that a fault has occurred and has
the ability to correct the fault or operate around it?
A. A fail safe system
B. A fail soft system
C. A fault-tolerant system
D. A failover system
Give this one a try later!
C. a fault tolerant system
Which of the following floors would be most appropriate to locate information
processing facilities in a 6-stories building?
A. Basement